نتایج جستجو برای: cultural security
تعداد نتایج: 315882 فیلتر نتایج به سال:
the aim of this study is to investigate and determine the best aja’s information confrontation methods and techniques against the extra-regional forces. according researches in various sources can be realized, trans-regional forces approaches in the world of modern communications, brought under control the international community as a village and many of the information in the fields communicat...
To ensure successful compliance with information security (InfoSec) policy and standards, organisations must harmonise their InfoSec training programmes with the national culture of the local workforce. A successful InfoSec policy must demonstrate the value of security, not just the requirement for security. We conducted a quantitative study of 177 professionals across 35 national cultures to i...
Research on the human element of information security is fragmented at best. This paper presents a management framework for organizations in the health care industry who wish to improve their information security procedures in an effort to comply with HIPAA and other regulations. The emphasis is on securing an organization from internal threats by adequately educating employees and building an ...
Pathology and determination of students' moral vulnerability is significant step in their security against cultural, social, value, and moral changes. The present study has been done to assess the students' moral vulnerability. The theoretical framework composed of theories of Durkheim, Englehart and Lerner. By the survey technique, this study has examined the relationship between the moral vul...
the issue of social capital is a concept which has been emerged in all economic, social, political and cultural aspects in recent years. this concept includes all interactions, relationships, cooperation, commitment and interest which have connected people of the society. having its role and social importance, it can influence security dimensions including economic, political, juridical and soc...
Recent Articles: n Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation n Administering the Semantic Web: Confidentiality, Privacy, and Trust Management n Privacy-Preserving Transactions Protocol using Mobile Agents with Mutual Authentication As information technology and the Internet become increasingly pervasive in our daily lives, there is an essential need for ...
As everyday life is increasingly conducted online, and as the electronic world continues to move out into the physical, the privacy of information and action and the security of information systems are increasingly a focus of concern both for the research community and the public at large. Accordingly, privacy and security are active topics of investigation from a wide range of perspectives—ins...
This article was written with the aim of the pedestrian impact on increasing social interactions in urban spaces of Bojnourd, with emphasis on social dimensions of social interaction. The method of this research is descriptive-analytic, which first of all has been designed to identify theoretical perspectives, general criteria of environmental quality and then collect field data and interviews ...
Some types of intravaginal practices (IVP) may increase the risk for HIV acquisition. This is particularly worrisome for populations with dual high prevalence of HIV and IVP. Women involved in transactional sex are at increased risk for HIV infection in sub-Saharan Africa. Social, cultural and economic influences are strong drivers of IVP in this population. To explore this, we carried out a qu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید